header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote PHP Script Injection in phpBB ‘viewtopic.php’ Script

The 'viewtopic.php' phpBB script is prone to a remote PHP script injection vulnerability because the application fails to properly sanitize user-supplied URI parameters before using them to construct dynamically generated web pages. Exploiting this issue may allow a remote attacker to execute arbitrary commands in the context of the webserver that is hosting the vulnerable software.

Ability Mail Server Multiple Vulnerabilities

Ability Mail Server is prone to multiple vulnerabilities that may allow a remote attacker to carry out cross-site scripting and denial of service attacks. The server is prone to a cross-site scripting vulnerability that may allow an attacker to execute arbitrary HTML and script code in the browser of a vulnerable user. It is also prone to a denial of service vulnerability that occurs when an attacker establishes about 150-200 connections to various services such as SMTP, POP3, View FeaturesIMAP4, WebMail etc.

Microsoft Internet Explorer Mouse Event Hijacking Vulnerability

A vulnerability exists in Microsoft Internet Explorer that may permit a malicious Web page to hijack mouse events. This could potentially be exploited to trick an unsuspecting user into performing unintended actions such as approving pop-up dialogs. The method caching variant of this attack is also reported to work. This issue could potentially be exploited to execute arbitrary code or be used in other attacks. A variant of this proof of concept has been supplied by http-equiv: Just substitute the following: 1. <img src="greyhat.html" id=anch onmousedown="parent.nsc.style.width=2000;parent.nsc.style.height=2000;parent.pop.show(1,1,1,1);parent.setTimeout('showalert()',3000);" style="width=168px;height=152px;background-image:url('youlickit.gif');cursor:hand" title="click me!"></a> 2. location="shell:favoritesgreyhat[1].htm"

Cross-domain/Cross-zone Scripting in Microsoft Internet Explorer

A vulnerability exists in Microsoft Internet Explorer that may allow cross-domain/cross-zone scripting. It is reported that the vulnerability presents itself due to a failure to properly validate trust relationships between method calls that are made in separate Internet Explorer windows. This may make it possible for script code to access properties of a foreign domain or Security Zone. Exploitation may permit execution of arbitrary code as the victim user.

Insecure Temporary File Creation in Sun Java Virtual Machine

The Sun Java Virtual Machine is prone to an insecure temporary file creation weakness. The issue is caused by the 'Font.createFont' method creating a temporary file with a predictable name. This vulnerability can be exploited in combination with other vulnerabilities in Internet Explorer to execute arbitrary code on a vulnerable computer.

Mozilla Internet Browser External Protocol Handling Weakness

Mozilla Internet Browser is prone to a weakness that allows an external protocol to be called without user interaction, potentially exposing users to vulnerabilities in the underlying operating system or default handler for the registered protocol. This weakness can be exploited to execute arbitrary files.

Ethereal Multiple Vulnerabilities

Ethereal 0.10.5 is vulnerable to multiple vulnerabilities, including an iSNS protocol dissector vulnerability, a SMB protocol dissector vulnerability, and a SNMP protocol dissector vulnerability. These vulnerabilities are due to the application's failure to properly handle malformed packets. Successful exploitation of these vulnerabilities can lead to a denial of service condition and may also facilitate arbitrary code execution.

Multiple Vulnerabilities in JAWS

JAWS is prone to multiple vulnerabilities, including a cross-site scripting vulnerability that allows remote attackers to execute malicious code in the victim's browser, a file disclosure vulnerability that allows attackers to access sensitive files through directory traversal, and an authentication bypass vulnerability that allows unauthorized access to the system.

JAWS Multiple Vulnerabilities

JAWS is prone to a cross-site scripting vulnerability. This allows a remote attacker to create a malicious URI link that includes hostile HTML and script code, which can lead to the execution of attacker-supplied code in the victim's web browser. This can result in the theft of authentication credentials and other attacks. Additionally, JAWS is reported to be prone to a file disclosure vulnerability, allowing an attacker to disclose target files by using directory traversal sequences in URI parameters. An authentication bypass vulnerability also exists, where an attacker can create a cookie derived from a known value to authenticate to the system.

Recent Exploits: